CVE-2017-6951
kernel: NULL pointer dereference in keyring_search_aux function
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The keyring_search_aux function in security/keys/keyring.c in the Linux kernel through 3.14.79 allows local users to cause a denial of service (NULL pointer dereference and OOPS) via a request_key system call for the "dead" type.
La función keyring_search_aux en security/keys/keyring.c en el kernel de Linux hasta la versión 3.14.79 permite a usuarios locales provocar una denegación de servicio (referencia a puntero NULL y OOPS) a través de una llamada al sistema request_key para el tipo "muerte".
The keyring_search_aux function in security/keys/keyring.c in the Linux kernel allows local users to cause a denial of service via a request_key system call for the "dead" key type.
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix: An use-after-free flaw was found in the Linux kernel which enables a race condition in the L2TPv3 IP Encapsulation feature. A local user could use this flaw to escalate their privileges or crash the system. A flaw was found that can be triggered in keyring_search_iterator in keyring.c if type->match is NULL. A local user could use this flaw to crash the system or, potentially, escalate their privileges.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-03-16 CVE Reserved
- 2017-03-16 CVE Published
- 2024-08-05 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-476: NULL Pointer Dereference
CAPEC
References (9)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/96943 | Third Party Advisory | |
http://www.spinics.net/lists/keyrings/msg01845.html | Mailing List | |
http://www.spinics.net/lists/keyrings/msg01846.html | Mailing List | |
http://www.spinics.net/lists/keyrings/msg01849.html | Mailing List |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://access.redhat.com/errata/RHSA-2017:1842 | 2018-01-05 | |
https://access.redhat.com/errata/RHSA-2017:2077 | 2018-01-05 | |
https://access.redhat.com/errata/RHSA-2017:2669 | 2018-01-05 | |
https://access.redhat.com/security/cve/CVE-2017-6951 | 2017-09-06 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1433252 | 2017-09-06 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | <= 3.14.79 Search vendor "Linux" for product "Linux Kernel" and version " <= 3.14.79" | - |
Affected
|